What Blacklist Violations can we resolve?
-
Blacklist Email (e.g., Virus or Malware or Ransomware, etc Emails spread)
-
Blacklist URL (e.g, Virus or Malware or Ransomware Websites spread)
-
Application (e.g., Forbidden Applications access)
-
Ports (e.g., Forbidden Ports access)
-
Server (e.g., Forbidden Servers access)
-
Client (e.g., Forbidden Clients allow to access Internet or Data Center Resources)
-
Flow (e.g., Forbidden Flow between Application Server/Client connections)
Where can we monitor for Blacklist violations?
-
Monitoring Laptop/Desktop accessing the Internet
-
Monitoring Laptop/Desktop accessing the Wireless
How do we monitor your Blacklist violations?
We monitor the Outgoing Internet traffic by having the MacroProbe TAP into the spanned switch port or TAP into
the Wireless Router.
We monitor the following Blacklist metrics:
-
Blacklist Email (SMTP, IMAP4, POP3)
-
DNS URL
-
HTTP URL
-
Conversation Flow
What MacroProbe features do we use to monitor your Blacklist violations?
Blacklist Deployments:

Wireless Monitoring

Internet Monitoring